CVE-2024-35430

8.1 HIGH

📋 TL;DR

This vulnerability allows authenticated users in ZKTeco ZKBio CVSecurity to bypass password verification when exporting data. Attackers with valid credentials can extract sensitive information without proper authorization. Organizations using affected versions of this access control software are at risk.

💻 Affected Systems

Products:
  • ZKTeco ZKBio CVSecurity
Versions: v6.1.1_R and earlier
Operating Systems: Windows-based systems running ZKBio CVSecurity
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated user access; affects all installations with default configurations.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Malicious insider or compromised account exports all biometric data, user credentials, access logs, and system configurations, leading to complete security compromise and potential identity theft.

🟠

Likely Case

Authenticated attacker exports sensitive personnel data, access patterns, and system information for reconnaissance or data exfiltration.

🟢

If Mitigated

Limited data exposure if strong access controls, network segmentation, and monitoring are in place to detect unusual export activities.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is straightforward once credentials are obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 6.1.3_R

Vendor Advisory: https://www.zkteco.com/en/Security_Bulletinsibs/16

Restart Required: Yes

Instructions:

1. Download ZKBio CVSecurity v6.1.3_R from ZKTeco support portal. 2. Backup current configuration and data. 3. Install the update following vendor instructions. 4. Restart the application/service. 5. Verify functionality.

🔧 Temporary Workarounds

Restrict Export Permissions

all

Limit data export capabilities to only essential administrative accounts

Monitor Export Activities

all

Implement logging and alerting for data export operations

🧯 If You Can't Patch

  • Implement strict access controls and least privilege principles for all user accounts
  • Segment the ZKBio CVSecurity system from other critical networks and monitor all data export activities

🔍 How to Verify

Check if Vulnerable:

Check ZKBio CVSecurity version in application settings or about dialog; versions 6.1.1_R or earlier are vulnerable.

Check Version:

Check application GUI or configuration files for version information

Verify Fix Applied:

Confirm version is 6.1.3_R or later and test export functionality with non-admin accounts to verify password prompts work.

📡 Detection & Monitoring

Log Indicators:

  • Unusual data export activities, especially from non-admin accounts
  • Multiple export attempts in short timeframes
  • Export operations without corresponding authentication events

Network Indicators:

  • Large data transfers from ZKBio CVSecurity system
  • Export-related API calls without proper authentication headers

SIEM Query:

source="zkbio_logs" AND (event="data_export" OR operation="export") AND user!="admin"

🔗 References

📤 Share & Export